Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
Tracebit logo with a circular purple emblem and lowercase text.

Catching Shai-Hulud with High Fidelity Deception Engineering Canaries

Learn how high-fidelity canaries complement your detection strategy to catch emerging threats that slip past conventional controls.

Live webinar

·

April 3, 1pm ET/10am PT

·

Register for webinar
Nick Reva

Director of Security Engineering at DoorDash

Robert Thurtell

Founding Sales Lead

Traditional detection engineering approaches struggle to keep pace with sophisticated supply chain attacks like Shai-Hulud, where compromised NPM packages weaponize popular security tools against your own infrastructure. In this technical session, learn how high-fidelity canaries complement your detection strategy to catch emerging threats that slip past conventional controls.

Join Nick Reva, Director of Security Engineering at DoorDash. With 19 years of security engineering experience at high engineering bar companies such as SpaceX and Snap. He’ll be joined by Rob Thurtell from Tracebit for a hands-on exploration of threat-informed detection engineering and deception techniques.

You'll learn how to:

  • Deploy high-fidelity canaries that catch abuse other signals miss
  • Detect supply chain attacks like Shai-Hulud before they compromise your secrets
  • Complement traditional detection rules with high-fidelity canaries to catch threats you can't easily monitor
  • Get started with Tracebit Community Edition with a live demo

Who Should Attend:

  • Security leaders wanting to improve threat detection and post-breach capabilities
  • Security engineers and architects building detection engineering programs
  • Detection and response teams looking to improve signal fidelity and reduce alert fatigue
  • DevSecOps professionals responsible for supply chain security
Register for webinar
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings